Published inLevel Up CodingWhat About The LastPass Breach?Password managers should keep passwords safe. After this last security incident, it might become difficult to trust them again.Jan 10, 2023Jan 10, 2023
Published inLevel Up CodingIt’s Not Always About Code, It’s DesignSoftware developers have an obsession with code. It must be efficient, scalable and even pretty. The thing is that sometimes changing the…Sep 20, 2022Sep 20, 2022
Published inITNEXTTowards A Passwordless Web With Apple PasskeysSign-in to services and apps without a password using passkeysSep 8, 20221Sep 8, 20221
Published inLevel Up CodingThings to Know About Django BeforehandChoosing the appropriate technology stack is not easy, and it would be good to know if a certain framework suits your use case earlier…Mar 8, 2022Mar 8, 2022
Published inLevel Up CodingCookies and Sessions: A Gentle Introduction With PHPEvery sufficiently complex web application use cookies and sessions. They are two technologies that you absolutely have to know, even if…Jan 10, 20222Jan 10, 20222
How to Implement Two Factor Authentication in a Web ApplicationEnhance the security of your web application by implementing 2FASep 23, 2021Sep 23, 2021
Published inLevel Up CodingLinux Auditing System: Centralized Logging to Remote ServerWhat is Linux Auditing System and how to use it to create a centralized logging systemAug 31, 2021Aug 31, 2021
Published inLevel Up CodingPyPy: compliant, flexible and fast implementation of PythonRunning the same Python script even hundreds of times faster, with no effort.Aug 31, 20211Aug 31, 20211
Published inILLUMINATIONYou Should Be Wrong More OftenNo one wants to be wrong, right?Mar 21, 2021Mar 21, 2021
Published inPredictNeural Implants and Brain Computer IntegrationThe idea of controlling the surrounding environment just with our minds was, until a few years ago, science fiction. Today, it is possible.Mar 12, 2021Mar 12, 2021